If you are looking to extend your iOS programming skills beyond the basics then More iPhone Development with Objective-C is for you. Authors Dave Mark, Jayant Varma, Jeff LaMarche, Alex Horovitz, and Kevin Kim explain concepts as only they can—with code snippets you can customize and use, as you like, in your own apps. More iPhone Development with Objective-C is an independent companion …
This book introduces the application of knowledge management (KM) theories, practices, and tools in school organization for sustainable development. Schools in Asia Pacific have long faced a variety of challenges in terms of sustainable development under the education reforms and curriculum reforms to meet the demands of a knowledge society. Schools are inevitably expected to develop human c…
This book constitutes the thoroughly refereed proceedings of the 6th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2014, held in Rome, Italy, in October 2014. The 37 full papers presented were carefully reviewed and selected from 287 submissions. The papers are organized in topical sections on knowledge discovery and information ret…
The 11 full papers presented were carefully reviewed and selected from 58 submissions. The papers reflect a growing effort to increase the dissemination of new results among researchers and professionals related to evaluation of novel approaches to software engineering. By comparing novel approaches with established traditional practices and by evaluating them against software quality criteria,…
This book constitutes the refereed proceedings of the 38th Annual German Conference on Artificial Intelligence, KI 2015, held in Dresden, Germany, in September 2015. The 15 revised full technical papers presented together with 14 technical communications, 4 doctoral consortium contributions, and 3 keynotes were carefully reviewed and selected from 58 submissions. The conference provides …
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
This book constitutes the proceedings of the 14th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2015, held in Athens, Greece in June/July 2015. The 25 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The book also contains 3 full-paper invited talks. The contributions are organized in topical sections named: routing, connectivi…
This book constitutes the refereed proceedings of six workshops collocated with the 13th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW Workshops 2014, held in Benidorm, Spain, in June 2014. The 25 revised full papers presented were carefully reviewed and selected from 59 submissions. The papers address the following topics: emerging technologies for smart devices; marin…
The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS. Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and indu…
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October 2014. This volume contains 74 full papers carefully reviewed and selected from 118 submissions at the following four conferences: the First International Conference on Cognitive Internet of Thing…